Note: This is an archival copy of Security Sun Alert 201658 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com
as Sun Alert 1001235.1.

4. A "MySQL" user with "INSERT" and "DELETE" privileges may be able to execute arbitrary commands with the privileges of the "MySQL" server due to a security vulnerability in the "CREATE FUNCTION" command.

Note: The "MySQL" server, mysqld(1), runs as an unprivileged user by default.

Contributing Factors

This issue can occur in the following releases:

SPARC Platform

Solaris 10 without patch 120292-01

x86 Platform

Solaris 10 without patch 120293-01

Note: Solaris 7, 8 and 9 are not impacted by this issue.

In order for a system to be vulnerable to any of the issues mentioned above, with the exception of issue number 3, the "MySQL" server daemon (mysqld(1)) must be running on the system. To determine if the "MySQL" server daemon is running on the system, the following command can be executed:

$ pgrep -lf mysqld
107098 /usr/sfw/sbin/mysqld

In order for the third issue described above to occur a user must invoke the mysqlaccess(1) script.

Symptoms

There are no predictable symptoms that would indicate the described issues have been exploited.

Workaround

In order to prevent issue number 3 above from occurring, sites may wish to stop users from executing the mysqlaccess(1) script until patches can be applied to the system.

To disable the mysqlaccess(1) script the following command can be executed as the root (uid 0) user: